Latest posts

Troubleshooting networks with TCPing

If you’d like to learn how to evaluate firewall connectivity, check on service restarts, and determine if servers are up even when ICMP is being blocked, read on for more on TCPing.

Continue reading

Trying again: Microsoft re-releases flawed patch

If you’re one of the small but significant number of users whose computer crashed due to the Patch Tuesday updates, the fixes – imperfect as they are – will be welcomed. If you’re not, you’re probably going to be a bit irritated at having to “fix what’s not broken” and possibly risk brand new problems.

Continue reading

How to resolve ADFS issues with Event ID 364

One common error that comes up when using ADFS is logged by Windows as an Event ID 364-Encounterd error during federation passive request. There are three common causes for this particular error. If you encounter this error, see if one of these solutions fixes things for you.

Continue reading

GFI Charity Fund Foundation takes the ALS #IceBucketChallenge

Members of GFI’s Malta office responded to a call from the GFI Charity Fund Foundation to take on the ALS #IceBucketChallenge. Video here!

Continue reading

Introducing: The great cloud guidebook

We’re launching another ebook on the cloud, The great cloud guidebook, packed with advice and information by 10 experts and independent authors.

Continue reading

Top 10 free tools for digital forensic investigation [Video]

We’ve selected the top ten tools for digital forensic investigation and incorporated them in this short video. Enjoy!

Continue reading

13 things every employee should do before calling the helpdesk

Is there something you could do to reduce the number of calls from users? Yes! Here are 13 things every employee should be asked / taught to do before they call or email helpdesk.

Continue reading

Could your business survive a day without IT?

The chances are that your company could survive a single day without IT, but you can be sure that subsequent down days would prove fraught and stressful. So, make the plans now, before a real life event proves how important it is!

Continue reading

Sharing and storing data? File this away

How are telecommuters sharing the files, folders and communications generated in the course of collaborating? And what measures are taken to protect privacy, ensure safety and meet compliance? The answers matter.

Continue reading

Organized cybercrime: bad guys go pro, highlighting “customer service”

This increasing “professionalization” of the cybercrime industry is troubling for many reasons. Security expert, Deb Shinder looks into this.

Continue reading